Text
Information security governace simplified: from the boardroom to the keyboard
Contents
Chapter 1 Getting information security right: top to bottom
Chapter 2 Developing information security strategy
Chapter 3 Defining the security management
Chapter 4 Interacting with the C-suite
Chapter 5 Managing risk to an acceptable level
Chapter 6 Creating effective information security policies
Chapter 7 Security compliance using control frameworks
Chapter 8 Managerial controls: practical security considerations
Chapter 9 Operational controls: practical security considerations
Chapter 10 Operational controls: practical security considerations
Chapter 11 The auditors have arrived, now what
Chapter 12 Effective security communications
Chapter 13 The law and information security
Chapter 14 Learning from information security incidents
Chapter 15 17 ways to dismantle information security governance efforts
No other version available